CVE-2019-16884

Source
https://nvd.nist.gov/vuln/detail/CVE-2019-16884
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2019-16884.json
Aliases
Related
Published
2019-09-25T18:15:13Z
Modified
2023-11-29T07:16:10.370790Z
Details

runc through 1.0.0-rc8, as used in Docker through 19.03.2-ce and other products, allows AppArmor restriction bypass because libcontainer/rootfs_linux.go incorrectly checks mount targets, and thus a malicious Docker image can mount over a /proc directory.

References

Affected packages

Git / github.com/docker/docker

Affected ranges

Type
GIT
Repo
https://github.com/docker/docker
Events
Introduced
0The exact introduced commit is unknown
Last affected
Type
GIT
Repo
https://github.com/docker/engine
Events
Introduced
0The exact introduced commit is unknown
Last affected
Type
GIT
Repo
https://github.com/opencontainers/runc
Events

Affected versions

0.*

0.0.3

upstream/0.*

upstream/0.1.1
upstream/0.1.2
upstream/0.1.3
upstream/0.1.4

v0.*

v0.0.1
v0.0.2
v0.0.3
v0.0.4
v0.0.5
v0.0.6
v0.0.7
v0.0.8
v0.0.9
v0.1.0
v0.1.1